Follow
Du-Shiau Tsai
Du-Shiau Tsai
Associate Professor of Information Networking Technology,Hsiuping University of Science & Technology
Verified email at hust.edu.tw - Homepage
Title
Cited by
Cited by
Year
Cheating in visual cryptography
G Horng, T Chen, DS Tsai
Designs, Codes and Cryptography 38, 219-236, 2006
2132006
A cheating prevention scheme for binary visual cryptography with homogeneous secret images
DS Tsai, TH Chen, G Horng
Pattern Recognition 40 (8), 2356-2366, 2007
1062007
A novel secret image sharing scheme for true-color images with size constraint
DS Tsai, G Horng, TH Chen, YT Huang
Information Sciences 179 (19), 3247-3254, 2009
1032009
Reversible data hiding scheme based on neighboring pixel differences
YY Tsai, DS Tsai, CL Liu
Digital Signal Processing 23 (3), 919-927, 2013
862013
Comment on “cheating prevention in visual cryptography”
YC Chen, G Horng, DS Tsai
IEEE transactions on image processing 21 (7), 3319-3323, 2012
762012
A new authentication based cheating prevention scheme in Naor–Shamir’s visual cryptography
YC Chen, DS Tsai, G Horng
Journal of Visual Communication and Image Representation 23 (8), 1225-1233, 2012
612012
Owner–customer right protection mechanism using a watermarking scheme and a watermarking protocol
TH Chen, DS Tsai
Pattern Recognition 39 (8), 1530-1541, 2006
612006
On generating meaningful shares in visual secret sharing scheme
DS Tsai, T Chen, G Horng
The Imaging Science Journal 56 (1), 49-55, 2008
492008
Visual secret sharing with cheating prevention revisited
YC Chen, DS Tsai, G Horng
Digital Signal Processing 23 (5), 1496-1504, 2013
282013
A fast VQ codebook generation algorithm based on OTSU histogram threshold
CC Huang, DS Tsai, G Horng
Fundamenta Informaticae 91 (3-4), 563-579, 2009
102009
Cheating prevention in visual cryptography
YC Chen, G Horng, DS Tsai
Visual Cryptography and Secret Image Sharing. CRC Press/Taylor & Francis …, 2011
72011
An anonymous buyer‐reseller watermarking protocol
TH Chen, G Horng, D Tsai
Journal of the Chinese institute of engineers 28 (3), 535-538, 2005
72005
Visibility bounds for visual secret sharing based on JND theory
DS Tsai, YC Chen
Multimedia tools and applications 70, 1825-1836, 2014
52014
Efficient Vector Quantization codebook generation based on Histogram Thresholding algorithm
CC Huang, DS Tsai, G Horng
2008 International Conference on Intelligent Information Hiding and …, 2008
42008
Cheating human vision in visual secret sharing
YC Chen, G Horng, DS Tsai
Cryptology ePrint Archive, 2011
22011
On the Security of a Cheating Immune Visual Secret Sharing Scheme.
YC Chen, DS Tsai, G Horng
IACR Cryptol. ePrint Arch. 2011, 631, 2011
22011
A new deterministic algorithm based cheating prevention scheme for Visual Cryptography
DS Tsai, CC Huang
修 平 學 報, 147, 2010
22010
Speeding up Pairing Computation Using Non-adjacent Form and ELM Method.
CL Liu, G Horng, DS Tsai
Int. J. Netw. Secur. 18 (1), 108-115, 2016
12016
Share Authentication based Cheating Prevention in Naor-Shamir’s Visual Cryptography
YC Chen, G Horng, DS Tsai
Journal of Computers 21 (1), 2011
12011
On Visual False Positive Secret in 2-out-of-n Visual Cryptography
DS Tsai
修平學報, 41-54, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20